2009 Fourth International Conference on Communications and Networking in China 2009
DOI: 10.1109/chinacom.2009.5339828
|View full text |Cite
|
Sign up to set email alerts
|

MIDTONE: Multicast in delay tolerant networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Network coding has been involved in data routing in DTNs by several existing works [21], [22]. WC-NC [9] is designed by merging the random linear network coding into the DTN routing, together with the replica re-allocation and memory management.…”
Section: Related Workmentioning
confidence: 99%
“…Network coding has been involved in data routing in DTNs by several existing works [21], [22]. WC-NC [9] is designed by merging the random linear network coding into the DTN routing, together with the replica re-allocation and memory management.…”
Section: Related Workmentioning
confidence: 99%
“…In Ref. [43] through simulations for Spray and Wait forwarding. In general it is known that in conventional multicast/broadcast networks, network coding improves the performance by taking advantage of the redundancy of packets in the network and combining them by XOR operation reduces the number of new transmissions in the network [42].…”
Section: Background Technologymentioning
confidence: 99%
“…limited buffer more efficiently because, instead of dropping packets, it can reduce the number of packets by combining existing packets in the buffer [41][42][43]. But the delay also increases, as more transmissions will be needed for the destination to receive larger number of packets (n independent combinations of packets are needed for decoding).…”
Section: Generalization Of the Model To The Transmission With Networkmentioning
confidence: 99%
“…If by contrast the message diffusion is performed after the end of the membership interval, in case some K Besides [3] -whose models are also adopted by [6], [11] -only a few works consider temporal constraints. In [17], [19], late joins are managed by buffering messages till their lifetime expiration.…”
Section: Role Of Time In On Multicastmentioning
confidence: 99%